Individual Research Activity 3- Prakhar Sharma
.docx
keyboard_arrow_up
School
Durham College *
*We aren’t endorsed by this school
Course
1200
Subject
Accounting
Date
Feb 20, 2024
Type
docx
Pages
4
Uploaded by sprakhar693
Individual Research Activity 3
1.
What control activity weaknesses should Vanessa report to her father?
Lack of Oversight and Record Keeping for Room Usage:
Vanessa should explain to her father that the hotel needs a more robust system for tracking room usage. The incident with Kevin's friends using a hotel room without any payment being recorded is a big red flag. It's crucial to have a system that ensures every room used is accounted for financially. This means implementing a foolproof check-in and check-out process that leaves no room for unauthorized use.
Inadequate Inventory Control in the Lounge:
The situation in the lounge, where drinks were served but not always recorded, points to a
serious lapse in inventory control. Vanessa should highlight the importance of accurately tracking every item sold, especially during busy periods. Using unrecorded stock, like the
tequila bottles from under the bar, can lead to significant revenue loss and makes it difficult to track the actual sales against inventory.
Absence of Automated Systems in Parking Garage:
Vanessa should discuss with her father the risks associated with the manual parking fee collection system. While Kevin's preference for a personal touch is commendable, it's also vulnerable to errors or dishonesty. An automated system would not only reduce these
risks but also provide more reliable and detailed data about the parking garage's usage and revenue.
Potential Conflict of Interest:
PRAKHAR SHARMA
220545968
It's important for Vanessa to point out the potential conflict of interest in having Kevin's family members in key positions without proper oversight. This arrangement can lead to misuse of hotel resources or even fraud. A more neutral and professional oversight structure might be necessary to maintain integrity in hotel operations.
Lack of Proper Segregation of Duties:
Vanessa should explain the principle of segregation of duties – ensuring that no single employee has control over all parts of a financial transaction. This is a basic internal control mechanism to prevent fraud and errors. In the hotel's case, the same people are handling transactions and maintaining records, which is a risky setup.
Inadequate Monitoring and Reconciliation Procedures:
Finally, Vanessa should emphasize the need for regular and thorough monitoring and reconciliation of sales records, inventory, and cash receipts. This is essential for early detection of any discrepancies that might indicate errors or fraud.
2.
If Vanessa wanted to determine how much money has been stolen or lost from the hotel, how could she do this? Is it possible?
Vanessa should propose a detailed audit to compare records with physical inventory and sales data. This would involve looking at room occupancy records, bar inventory versus sales, and parking garage receipts.
She might also suggest analyzing historical data to identify any unusual patterns or discrepancies that have emerged recently.
It's important to acknowledge that while it might be challenging to determine the exact amount lost or stolen, especially if records have been manipulated, a thorough investigation can provide a good estimate.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Provide an example of each of the following;
Conspicuous consumption
Information you will need to fill out an application to rent an apartment
A government agency you can contact to file a fraud complaint
A way to prevent fraud on your credit card
A way to protect yourself from identity theft
arrow_forward
Please Solve In 20mins
arrow_forward
audit
please quickly i will give you a thumb!!!
arrow_forward
Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system?
a. The need to sell confidential information from the database for cash to pay for his medical bills
b. User names and passwords of most employees are stored in a shared Google document file
c. The employee's discovery that passwords are not required to enter any modules in the accounting information system
d. Supervisors are not required to approve transactions entered into by their staff in the accounting system
arrow_forward
Question 1 :
What are your two biggest concerns relating to possible fraud for the motel part of the business? For each concern, generate two or three controls that could effectively reduce risk related to your concerns. Use common sense and be creative!
Question 2 :
What are your two biggest concerns relating to possible fraud for the café part of the business? For each concern, generate two or three controls that could effectively reduce risk related to your concerns. Use common sense and be creative!
Question 3 :
Briefly describe the impact each proposed control would have on the efficiency of running the business. Are the controls you generated both effective and efficient?
Question 4 :
Describe the potential impact of your proposed controls on the morale of the couple in charge of the day-to-day operations. How might Norman deal with these concerns?
arrow_forward
Choose only one answer as well as state their reasons/rationale for the answer chosen.
3) A sales representative mistakenly entered a nonexistent account number into the system. As a result, the goods were shipped but the customer was never billed. Which type of control would be most effective in preventing this type of problem?a. Turnaround documentb. Completeness checkc. Field checkd. Validity checke. Check digit verification
arrow_forward
For the given scenario, identify the weakness or weaknesses in internal control and opposite the identified weakness
or weaknesses, enumerate the control procedure/s that you will recommend to avoid or mitigate the risk of loss:
A small branch of Avon Cosmetics in Tuao, Cagayan employs Amelia Rodriguez as Branch Manager and Mary Gonzales
as her sales assistant. The Branch uses a bank account in Tuao, Cagayan to pay for expenses in the name of Avon
Cosmetics - Special Account. To pay expenses, checks must be signed by Amelia Rodriguez or John Dee, the treasurer
of Avon Cosmetics. Amelia receives the cancelled checks and bank statements. she reconciles the branch account
herself and files cancelled checks and bank statements in her records. She also periodically prepares reports of cash
disbursements and sends them to thehome office in Makati.
arrow_forward
Forensic Accounting: Assurance Engagement 2: Net Worth Analysis. You can use the computer-based Electronic Workpapers on the textbook website to prepare the net worth analysis required in this problem.Net worth analysis is performed when fraud has been discovered or is strongly suspected and the information to calculate a suspect’s net worth can be obtained (e.g., asset and liability records, bank accounts). The procedure used is to calculate the person’s change in net worth (excluding changes in market values of assets) and to identify the known sourcesof funds to finance the changes. Any difference between the change in net worth and the known sources of funds is called funds from unknown sources, which might include illgotten gains.Nero has worked for Bonne Consulting Group (BCG) as the executive secretary for administration for nearly 10 years. Her dedication has earned her a reputation as an outstanding employee and has resulted in increasing responsibilities. Nero is also a…
arrow_forward
Correcting internal control weakness
Each of the following situations has an internal control weakness.
Jade Applications has decided that one way to cut costs in the upcoming year is to fire the external auditor. The business believes that the internal auditor should be able to efficiently monitor the company’s internal controls.
In an effort to minimize the amount of paperwork, Ross Homes has decided that it will not keep copies of customer invoices related to sales revenue. Ross believes that this effort will minimize the amount of data storage the company will have to pay for.
Elle Bee, a trusted employee for many years, has never taken a vacation. The owner believes that he’s lucky that she is so committed to her job.
The Medicine Chest Company keeps a small petty cash fund to handle small cash transactions. Because no one wants to volunteer to be the custodian, the business manager has decided that all employees should have access to the petty cash. She figures that as long as…
arrow_forward
Controls and Processes
Review the article entitled, "Who's in Control of the Ark? A Study of Internal Controls in Operating and Auditing A Small Preschool." Explain two internal controls the school is implementing well, two internal controls the school could improve on, and two internal controls that could open the door to fraud. Make sure all internal controls are from the accounting information system (AIS) framework. Be sure to respond to at least one of your classmates' posts.
arrow_forward
The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring.
Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data.
An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password.
An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names.
A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…
arrow_forward
Which of the following is NOT a behavioral red flag of the fraudster?
a) Addictions
b) Switches jobs every 2-3 years
c) Peer pressure
d) Living beyond means
arrow_forward
Warehouse operations have shut down at SHXCX Manufacturing
suddenly due to a power outage. Warehouse managers are still
able to communicate with their home office and their data
servers, but unfortunately have no prepared solution to restoring
operations. Which of the following controls would be best suited
to combat this problem?
Select one:
O a. Validity test
O b. Business Continuity Plan (BCP)
c. Disaster Recovery Plan (DRP)
d. Both B and C
arrow_forward
The goal of this problem is to identify and implement the proper internal controls on the following scenario. Give lengthy responses to each question.
Tim just recently opened a pet store. He sells pet food, toys, and everything else a pet owner needs to keep their pets happy. He hired a bunch of employees to help him run his shop. As of today he only collects cash from his customers. During business hours he keeps most of the cash in the front desk drawer. After he closes, he counts the money puts in an envelope keeps the money at his desk drawer in the back office. He keeps the back office locked unless he sends one of his employees in the back office to get supplies or cash when they run out at the front desk. At the end of the month Tim deposits the money in the bank.
1. What kinds of internal controls should Tim implement to protect the cash at his pet shop? Explain how each internal controls would protect cash.
2. Why is so important for Tim or any company to implement…
arrow_forward
Do not provide solution in imge format. and also do not provide plagarised content otherwise i dislike
arrow_forward
Determine whether each procedure described below is an internal control strength or weakness; then identify the internal control principle violated or followed for each procedure. 1. The same employee requests, records, and makes payment for purchases of inventory. 2. The company saves money by having employees involved in operations perform the only review of internal controls. 3. Time is saved by not updating records for use of supplies. 4. The recordkeeper is not allowed to write checks or initiate EFTs. 5. Each salesclerk is in charge of her own cash drawer.
arrow_forward
Case 1: Fraud examination
Karen, a friend of yours, recently started her own business, The Bike and Boulder
Company (B&B). B&B specializes in the sales of mountain bikes and rock- climbing
equipment. Karen is putting the finishing touches on her company policies and
procedures. She knows you are taking a fraud class and asks you to review what
she has completed thus far. You quickly notice that Karen has neglected to address
fraud and fraud prevention in her policies and procedure. What policies and
procedures would you suggest Karen implement to prevent and detect fraud at B&B?
arrow_forward
N³
arrow_forward
Listed below are five procedures followed by Gilmore Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below.
Procedure
IC Good or Weak?
Related Internal Control Principle
1.
Employees are required to take vacations.
Select a weakness in internal control GoodWeak
Select a control principle that is violated Independent Internal VerificationSegregation of DutiesEstablishment of ResponsibilityPhysical ControlsHuman Resource ControlsDocumentation Procedures
2.
Any member of the sales department can approve credit sales.
Select a weakness in internal control…
arrow_forward
Listed below are five procedures followed by Gilmore Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below.
Procedure
IC Good or Weak?
Related Internal Control Principle
1.
Employees are required to take vacations.
Select a weakness in internal control
GoodWeak
Select a control principle that is violated
Human Resource ControlsIndependent Internal VerificationEstablishment of ResponsibilityPhysical ControlsSegregation of DutiesDocumentation Procedures
2.
Any member of the sales department can approve credit sales.
Select a weakness in internal control
WeakGood
Select a control principle that is violated
Segregation of DutiesDocumentation ProceduresEstablishment…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Survey of Accounting (Accounting I)
Accounting
ISBN:9781305961883
Author:Carl Warren
Publisher:Cengage Learning
Related Questions
- Provide an example of each of the following; Conspicuous consumption Information you will need to fill out an application to rent an apartment A government agency you can contact to file a fraud complaint A way to prevent fraud on your credit card A way to protect yourself from identity theftarrow_forwardPlease Solve In 20minsarrow_forwardaudit please quickly i will give you a thumb!!!arrow_forward
- Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardQuestion 1 : What are your two biggest concerns relating to possible fraud for the motel part of the business? For each concern, generate two or three controls that could effectively reduce risk related to your concerns. Use common sense and be creative! Question 2 : What are your two biggest concerns relating to possible fraud for the café part of the business? For each concern, generate two or three controls that could effectively reduce risk related to your concerns. Use common sense and be creative! Question 3 : Briefly describe the impact each proposed control would have on the efficiency of running the business. Are the controls you generated both effective and efficient? Question 4 : Describe the potential impact of your proposed controls on the morale of the couple in charge of the day-to-day operations. How might Norman deal with these concerns?arrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 3) A sales representative mistakenly entered a nonexistent account number into the system. As a result, the goods were shipped but the customer was never billed. Which type of control would be most effective in preventing this type of problem?a. Turnaround documentb. Completeness checkc. Field checkd. Validity checke. Check digit verificationarrow_forward
- For the given scenario, identify the weakness or weaknesses in internal control and opposite the identified weakness or weaknesses, enumerate the control procedure/s that you will recommend to avoid or mitigate the risk of loss: A small branch of Avon Cosmetics in Tuao, Cagayan employs Amelia Rodriguez as Branch Manager and Mary Gonzales as her sales assistant. The Branch uses a bank account in Tuao, Cagayan to pay for expenses in the name of Avon Cosmetics - Special Account. To pay expenses, checks must be signed by Amelia Rodriguez or John Dee, the treasurer of Avon Cosmetics. Amelia receives the cancelled checks and bank statements. she reconciles the branch account herself and files cancelled checks and bank statements in her records. She also periodically prepares reports of cash disbursements and sends them to thehome office in Makati.arrow_forwardForensic Accounting: Assurance Engagement 2: Net Worth Analysis. You can use the computer-based Electronic Workpapers on the textbook website to prepare the net worth analysis required in this problem.Net worth analysis is performed when fraud has been discovered or is strongly suspected and the information to calculate a suspect’s net worth can be obtained (e.g., asset and liability records, bank accounts). The procedure used is to calculate the person’s change in net worth (excluding changes in market values of assets) and to identify the known sourcesof funds to finance the changes. Any difference between the change in net worth and the known sources of funds is called funds from unknown sources, which might include illgotten gains.Nero has worked for Bonne Consulting Group (BCG) as the executive secretary for administration for nearly 10 years. Her dedication has earned her a reputation as an outstanding employee and has resulted in increasing responsibilities. Nero is also a…arrow_forwardCorrecting internal control weakness Each of the following situations has an internal control weakness. Jade Applications has decided that one way to cut costs in the upcoming year is to fire the external auditor. The business believes that the internal auditor should be able to efficiently monitor the company’s internal controls. In an effort to minimize the amount of paperwork, Ross Homes has decided that it will not keep copies of customer invoices related to sales revenue. Ross believes that this effort will minimize the amount of data storage the company will have to pay for. Elle Bee, a trusted employee for many years, has never taken a vacation. The owner believes that he’s lucky that she is so committed to her job. The Medicine Chest Company keeps a small petty cash fund to handle small cash transactions. Because no one wants to volunteer to be the custodian, the business manager has decided that all employees should have access to the petty cash. She figures that as long as…arrow_forward
- Controls and Processes Review the article entitled, "Who's in Control of the Ark? A Study of Internal Controls in Operating and Auditing A Small Preschool." Explain two internal controls the school is implementing well, two internal controls the school could improve on, and two internal controls that could open the door to fraud. Make sure all internal controls are from the accounting information system (AIS) framework. Be sure to respond to at least one of your classmates' posts.arrow_forwardThe following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forwardWhich of the following is NOT a behavioral red flag of the fraudster? a) Addictions b) Switches jobs every 2-3 years c) Peer pressure d) Living beyond meansarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Century 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:Cengage
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LSurvey of Accounting (Accounting I)AccountingISBN:9781305961883Author:Carl WarrenPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Survey of Accounting (Accounting I)
Accounting
ISBN:9781305961883
Author:Carl Warren
Publisher:Cengage Learning